Category: View All
View All
BUILD IT – Time-Lapse – LEGO 31121 : Creator 3in1 Crocodile
Patching Applications to Maintain System Security
In the digital age, it’s no secret that security is paramount. With the number of security breaches and data leaks increasing day by day, it is important to take measures to secure your data. One such measure is patching applications. Patching is the process of updating software, firmware, or hardware components to fix vulnerabilities and improve performance. In this post, we will discuss the importance of patching applications to maintain system security. What is a patch? A patch is a software update that fixes bugs, improves performance, and provides security updates. Patches can be applied to operating systems, applications, and… Continue reading
It’s not their fault, if you don’t educate.
One of the biggest fears I have is having our server exposed to some form of crypto locker malware. And it’s also not a case of if it happens, but when, because it will. As an organisation that relies on digital information, it’s crucial to protect your business from malware attacks. Unfortunately, despite having robust anti-virus and anti-malware software in place, these measures are not enough to prevent every attack. Your frontline troops against malware are your users. Therefore, it’s crucial to educate and train them on how to identify and respond to potential threats. The first step to ensuring… Continue reading
Email Impersonation and email Spoofing
Email Impersonation is where an attacker sets up an email address to look like another legitimate email. It is similar to other attack methods which require a little more technical ability, like Email Impersonation, Email Spoofing, or Account Takeover attacks will generally fall into these categories With email impersonation and spoofing, all the attacker needs is an email address they believe they can pass off as something it’s not. It requires very little in the way of cost to setup and is quite easy to do. This is what we will focus on in this article. Types of email impersonation For… Continue reading
Secure your online data
October is Cyber Security Awareness MonthWe have touched on Updates and Passwords already, and last week we rambled about securing devices. If you missed it, find the previous posts. This week I want you to focus on what information you keep online. To be aware about what information is out there, what you share, and how you share it. So, I made a bit of a mistake.Now at the time it didn’t feel like a mistake. I thought what I did would be really useful, I thought it would help me connect to friends and relatives. I thought it would… Continue reading
Secure your Devices
October is Cyber Security Awareness MonthWe have already touched on Updates and Passwords. If you missed it, find the previous posts.This week I want you to Secure Your Devices Most obvious here is to ensure you lock your device with a passphrase, password, PIN or passcode. Stay away from patterns, dates/years, PINs which translate directly to guessable words or names etc. These are easily guessable and don’t offer any real security. Make sure your device is set to automatically lock after a short amount of inactivity and if you are walking away from your device, remember to lock it before… Continue reading
Passwords
October is Cybersecurity Awareness MonthHere is another tip to help you strengthen your personal Cyber security at homeIts Patch Tuwensday, did you get your automatic updates sorted? If you don’t know what I’m on about, go find last weeks tip. This week, lets focus on Passwords. Passwords are old, really old, and ever since they have been in use there have been people trying to crack them.Trying to remember a bunch of random characters is hard and when IT tells you that you should really have a separate password for each authentication service, it becomes impossible. How can we fix… Continue reading
Automatic Updates
October is Cybersecurity Awareness MonthHoping to share some tips this month to help you strengthen your personal Cyber security at homeThis week we’ll look at Automatic Updates Software and Hardware companies regularly release updates that either plague us with notifications to UPDATE NOW!!! or will sit there patiently waiting for you to notice them which you won’t install until something isn’t working quite right. Some of these updates introduce new features, others improve the performance, or provide security enhancements to keep the software bug free and resilient against exploitation. In all cases, your computer or device will run better and… Continue reading